The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 54 min 32 sek zpět

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

16 Duben, 2024 - 15:39
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide range of malware such as Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, among others. "The group made extensive use of steganography by sending VBSs, PowerShell code, as well as RTF documents with an embedded exploit, inside
Kategorie: Hacking & Security

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

16 Duben, 2024 - 15:39
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide range of malware such as Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, among others. "The group made extensive use of steganography by sending VBSs, PowerShell code, as well as RTF documents with an embedded exploit, inside Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

16 Duben, 2024 - 15:26
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. "Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in
Kategorie: Hacking & Security

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

16 Duben, 2024 - 15:26
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. "Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

16 Duben, 2024 - 13:14
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the discovery credited to researchers Fabian Bäumer and Marcus
Kategorie: Hacking & Security

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

16 Duben, 2024 - 13:14
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the discovery credited to researchers Fabian Bäumer and MarcusNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Identity in the Shadows: Shedding Light on Cybersecurity's Unseen Threats

16 Duben, 2024 - 13:10
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation of cloud services and remote work arrangements has heightened the vulnerability of digital identities to exploitation, making it imperative for businesses to fortify their identity security measures. Our recent research report, The Identity Underground
Kategorie: Hacking & Security

Identity in the Shadows: Shedding Light on Cybersecurity's Unseen Threats

16 Duben, 2024 - 13:10
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation of cloud services and remote work arrangements has heightened the vulnerability of digital identities to exploitation, making it imperative for businesses to fortify their identity security measures. Our recent research report, The Identity Underground The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations

16 Duben, 2024 - 10:36
The U.S. Federal Trade Commission (FTC) has ordered mental telehealth company Cerebral from using or disclosing personal medical data for advertising purposes. It has also been fined more than $7 million over charges that it revealed users' sensitive personal health information and other data to third-parties for advertising purposes and failed to honor its easy cancellation policies. "Cerebral
Kategorie: Hacking & Security

FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations

16 Duben, 2024 - 10:36
The U.S. Federal Trade Commission (FTC) has ordered mental telehealth company Cerebral from using or disclosing personal medical data for advertising purposes. It has also been fined more than $7 million over charges that it revealed users' sensitive personal health information and other data to third-parties for advertising purposes and failed to honor its easy cancellation policies. "Cerebral Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown

16 Duben, 2024 - 09:33
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to develop and distribute a remote access trojan called Hive RAT (previously Firebird). The U.S. Justice Department (DoJ) said the malware "gave the malware purchasers control over victim computers and enabled them to access victims' private communications, their login credentials, and
Kategorie: Hacking & Security

Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown

16 Duben, 2024 - 09:33
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to develop and distribute a remote access trojan called Hive RAT (previously Firebird). The U.S. Justice Department (DoJ) said the malware "gave the malware purchasers control over victim computers and enabled them to access victims' private communications, their login credentials, and Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

15 Duben, 2024 - 18:51
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with version 1.4.51, the lack of a CVE identifier or an advisory meant that
Kategorie: Hacking & Security

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

15 Duben, 2024 - 18:51
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with version 1.4.51, the lack of a CVE identifier or an advisory meant that Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

15 Duben, 2024 - 15:30
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn't a plot from the latest cyber-thriller; it's actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes on
Kategorie: Hacking & Security

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

15 Duben, 2024 - 15:30
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn't a plot from the latest cyber-thriller; it's actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes onThe Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

15 Duben, 2024 - 15:29
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42 said in a report published last week. "The threat
Kategorie: Hacking & Security

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

15 Duben, 2024 - 15:29
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42 said in a report published last week. "The threat Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

15 Duben, 2024 - 12:21
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach to privileged identity management aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with
Kategorie: Hacking & Security

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

15 Duben, 2024 - 12:21
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach to privileged identity management aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security